This event is endorsed
and organized by

10th International Conference on Security and Privacy in Communication Networks

September 24–26, 2014 | Beijing, People's Republic of China

Accepted Regular Papers

5 Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang and Daren Zha. EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients

7 Qianying Zhang, Shijun Zhao and Dengguo Feng. Improving the Security of the HMQV Protocol using Tamper-Proof Hardware

10 Jialong Zhang, Jayant Notani and Guofei Gu. Characterizing Google Hacking: A First Large-Scale Quantitative Study

19 Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen and Guofei Gu. Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-on Cross Site Scripting Attacks

21 Tilo Müller and Christopher Kugler. SCADS: Separated Control- and Data-Stack

22 Ziyu Wang and Jiahai Yang. A New Anomaly Detection Method Based on IGTE and IGFE

23 Byungho Min and Vijay Varadharajan. A Simple and Novel Technique for Counteracting Exploit Kits

29 Xiaoyan Sun, Jun Dai, Anoop Singhal and Peng Liu. Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

33 Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li. Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy

42 Duohe Ma. Defending Blind DDoS Attack on SDN Based on Moving Target Defense

45 Issa Khalil, Zuochao Dou and Abdallah Khreishah. TPM-based Authentication Mechanism for Apache Hadoop

49 Max Suraev. Implementing an affordable and effective GSM IMSI catcher with 3G authentication

51 Tayyaba Zeb, Abdul Ghafoor, Awais Shibli and Muhammad Yousaf. A Secure Architecture for Inter-Cloud Virtual Machine Migration

52 Nicolas Van Balen and Haining Wang. GridMap: Enhanced Security in Cued-Recall Graphical Passwords

58 Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang and Justin Zhan. An Information-Theoretic Approach for Secure Protocol Composition

61 Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao and Chunfu Jia. Control Flow Obfuscation using Neural Network to Fight Concolic Testing

68 Qinglong Zhang, Zongbin Liu, Quanwei Cai and Ji Xiang. TST:A New Randomness Test Method Based on Golden Distribution

70 Sarmad Ullah Khan. An Authentication and Key Management Scheme for Heterogeneous Sensor Networks

74 Shen Su and Beichuan Zhang. Detecting concurrent prefix hijack events online

75 Anna Squicciarini, Dan Lin, Smitha Sundareswaran and Jingwei Li. Policy Driven Node Selection in MapReduce

79 Vincenzo Gulisano, Magnus Almgren and Marina Papatriantafilou. METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures

80 Chen Cao, Yuqing Zhang, Qixu Liu and Kai Wang. Function Escalation Attack

83 Eirini Karapistoli, Panagiotis Sarigiannidis and Anastasios Economides. Wormhole Attack Detection in Wireless Sensor Networks based on Visual Analytics

89 Binh Vo and Steven Bellovin. Anonymous Publish-Subscribe Systems

91 Jeroen Massar, Ian Mason, Linda Briesemeister and Vinod Yegneswaran. JumpBox -- A Seamless Browser Proxy for Tor Pluggable Transports

93 Sushama Karumanchi, Jingwei Li and Anna Squicciarini. Securing Resource Discovery in Content Hosting Networks

95 Hugo Gonzalez, Natalia Stakhanova and Ali Ghorbani. DroidKin: Lightweight Detection of Android Apps Similarity

Accepted Short Papers

8 Yazhe Wang, Mingming Hu and Chen Li. UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts

15 Chengcheng Shao, Liang Chen, Shuo Fan and Xinwen Jiang. Social Authentication Identity: An Alternate to Internet Real Name System

16 Xi Xiao, Xianni Xiao, Yong Jiang and Qing Li. Detecting Mobile Malware with TMSVM

25 Yosra Ben Mustapha, Hervé Debar and Gregory Blanc. Policy Enforcement Point Model

27 Zhangjie Fu, Jiangang Shu, Xingming Sun and Naixue Xiong. An Effective Search Scheme based on Semantic Tree over Encrypted Cloud Data Supporting Verifiability

31 Pieter Burghouwt, Marcel E.M. Spruit and Henk J. Sips. Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations

37 Jingwei Li, Dan Lin, Anna Squicciarini and Chunfu Jia. STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds

38 Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State and Thomas Engel. RAMSES: Revealing Android Malware through String Extraction and Selection

48 Kan Chen, Peidong Zhu and Yueshan Xiong. Keep the Fakes Out: Defending against Sybil Attack in P2P systems

54 Zhang Lulu, Yongzheng Zhang and Tianning Zang. Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-coupled Payloads Filtering Scheme

72 Yuling Luo, Junxiu Liu, Jinjie Bi and Senhui Qiu. Hardware Implementation of Cryptographic Hash Function based on Spatiotemporal Chaos

81 Swarup Chandra, Zhiqiang Lin, Ashish Kundu and Latifur Khan. A Systematic Study of the Covert-Channel Attacks in Smartphones

86 Sami Zhioua, Adnene Ben Jabeur, Mahjoub Langar and Wael Ilahi. Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models

87 Eslam Abdallah, Mohammad Zulkernine and Hossam Hassanein. Countermeasures for Mitigating ICN Routing Related DDoS Attacks

90 Ding Wang and Ping Wang. On the Usability of Two-Factor Authentication

94 Bhaswati Deka, Ryan Gerdes, Ming Li and Kevin Heaslip. Friendly Jamming for Secure Localization in Vehicular Transportation

97 Wenjun Fan. Catering Honeypots Creating Based on the Predefined Honeypot Context